Learn More
Wireless mesh networks (WMNs) are low-cost access networks built on cooperative routing over a backbone composed of stationary wireless routers. WMNs must deal with the highly unstable wireless medium. Thus, routing metrics and protocols are evolving by designing algorithms that consider link quality to choose the best routes. In this work, we analyze the(More)
Currently, there is a strong effort of the research community in rethinking the Internet architecture to cope with its current limitations and support new requirements. Many researchers conclude that there is no one-size-fits-all solution for all of the user and network-provider needs and, thus, advocate for a pluralist network architecture , which allows(More)
The current Internet architecture allows malicious nodes to disguise their origin during denial-of-service attacks with IP spoofing. A well-known solution to identify these nodes is IP traceback. In this paper, we introduce and analyze a lightweight single-packet IP trace-back system that does not store any data in the network core. The proposed system(More)
— On most denial-of-service (DoS) attacks, packets with spoofed source addresses are employed in order to disguise the true origin of the attacker. A defense strategy is to trace attack packets back to their actual source in order to make the attacker accountable and isolate him from the network. To date, the proposed traceback systems require either large(More)
Wireless mesh networks (WMNs) are emerging as a promising solution for ubiquitous Internet access with mobility support. In such networks, user mobility may lead to Internet gateway changes and, consequently, impact the performance of continuous media applications. In this article, we investigate the impact of user mobility on the performance of(More)
The Internet architecture exposes the users to different types of digital attacks and threats. Denial of service (DoS) is a common attack which may cause huge damage to a victim. The prevention of such attacks is a challenge even for overprovisioned and up-to-date computers. As a consequence, the best way to inhibit DoS attacks is to be ready to react to(More)
—We review the main challenges and survey promising techniques for network interconnection in the Internet of the future. To this end, we first discuss the shortcomings of the Internet's current model. Among them, many are consequence of unforeseen demands on the original Internet design such as: mobility, multihoming, multipath, and network scalability.(More)
  • Diogo M F Mattos, Natalia C Fernandes, Leonardo P Cardoso, Victor T Da Costa, Lucas H Mauricio, Filipe P B M Barretto +9 others
  • 2011
Management is a challenge in computer networking because of the numerous monitoring variables and the difficulty to autonomously configure network parameters. This paper presents the OpenFlow MaNagement Infrastructure (OMNI) tool, which helps the administrator to control and manage OpenFlow networks by providing a remote management interface. The tool has a(More)